{"api_version":"1","generated_at":"2026-05-12T23:15:50+00:00","cve":"CVE-2026-32226","urls":{"html":"https://cve.report/CVE-2026-32226","api":"https://cve.report/api/cve/CVE-2026-32226.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2026-32226","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2026-32226"},"summary":{"title":".NET Framework Denial of Service Vulnerability","description":"Concurrent execution using shared resource with improper synchronization ('race condition') in .NET Framework allows an unauthorized attacker to deny service over a network.","state":"PUBLISHED","assigner":"microsoft","published_at":"2026-04-14 18:17:31","updated_at":"2026-05-06 15:00:58"},"problem_types":["CWE-362","CWE-362 CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')"],"metrics":[{"version":"3.1","source":"secure@microsoft.com","type":"Primary","score":"5.9","severity":"MEDIUM","vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H","data":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H","baseScore":5.9,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"}},{"version":"3.1","source":"CNA","type":"CVSS","score":"5.9","severity":"MEDIUM","vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C","data":{"baseScore":5.9,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C","version":"3.1"}}],"references":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32226","name":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32226","refsource":"secure@microsoft.com","tags":["Vendor Advisory"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://www.cve.org/CVERecord?id=CVE-2026-32226","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2026-32226","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"Microsoft","product":"Microsoft .NET Framework 3.5 AND 4.7.2","version":"affected 4.7.0 2.0.50727.9068 & 3.0.30729.9065 & 4.7.4141.0 custom","platforms":["Windows 10 Version 1809 for ARM64-based Systems","Windows 10 Version 1809 for x64-based Systems"]},{"source":"CNA","vendor":"Microsoft","product":"Microsoft .NET Framework 3.5 AND 4.8","version":"affected 4.8.0 2.0.50727.9068 & 3.0.30729.9065 & 4.8.4801.0 custom","platforms":["Windows 10 Version 1809 for 32-bit Systems","Windows 10 Version 1809 for ARM64-based Systems","Windows 10 Version 1809 for x64-based Systems","Windows Server, version 20H2 (Server Core Installation)"]},{"source":"CNA","vendor":"Microsoft","product":"Microsoft .NET Framework 3.5 AND 4.8.1","version":"affected 4.8.1 2.0.50727.9181 & 3.0.30729.9165 & 4.8.9332.0 custom","platforms":["Windows 11 Version 26H1 for ARM64-based Systems","Windows 11 version 26H1 for x64-based Systems","Windows Server 2025","Windows Server 2025 (Server Core installation)"]},{"source":"CNA","vendor":"Microsoft","product":"Microsoft .NET Framework 4.8","version":"affected 4.8.0 4.8.4801.0 custom","platforms":["Windows 10 Version 1607 for x64-based Systems","Windows Server 2012 (Server Core installation)","Windows Server 2012 R2","Windows Server 2012 R2 (Server Core installation)"]}],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2026","cve_id":"32226","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"microsoft","cpe5":".net_framework","cpe6":"3.5","cpe7":"-","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2026","cve_id":"32226","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"microsoft","cpe5":".net_framework","cpe6":"4.7.2","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2026","cve_id":"32226","vulnerable":"0","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"microsoft","cpe5":"windows_10_1809","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"arm64","cpe13":"*"},{"cve_year":"2026","cve_id":"32226","vulnerable":"0","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"microsoft","cpe5":"windows_10_1809","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"x64","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":{"cve_year":"2026","cve_id":"32226","cve":"CVE-2026-32226","epss":"0.000670000","percentile":"0.207150000","score_date":"2026-04-21","updated_at":"2026-04-22 00:07:41"},"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"adp":[{"metrics":[{"other":{"content":{"id":"CVE-2026-32226","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","timestamp":"2026-04-14T19:03:36.736622Z","version":"2.0.3"},"type":"ssvc"}}],"providerMetadata":{"dateUpdated":"2026-04-14T19:20:32.328Z","orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP"},"title":"CISA ADP Vulnrichment"}],"cna":{"affected":[{"platforms":["Windows 10 Version 1809 for ARM64-based Systems","Windows 10 Version 1809 for x64-based Systems"],"product":"Microsoft .NET Framework 3.5 AND 4.7.2","vendor":"Microsoft","versions":[{"lessThan":"2.0.50727.9068 & 3.0.30729.9065 & 4.7.4141.0","status":"affected","version":"4.7.0","versionType":"custom"}]},{"platforms":["Windows 10 Version 1809 for 32-bit Systems","Windows 10 Version 1809 for ARM64-based Systems","Windows 10 Version 1809 for x64-based Systems","Windows Server, version 20H2 (Server Core Installation)"],"product":"Microsoft .NET Framework 3.5 AND 4.8","vendor":"Microsoft","versions":[{"lessThan":"2.0.50727.9068 & 3.0.30729.9065 & 4.8.4801.0","status":"affected","version":"4.8.0","versionType":"custom"}]},{"platforms":["Windows 11 Version 26H1 for ARM64-based Systems","Windows 11 version 26H1 for x64-based Systems","Windows Server 2025","Windows Server 2025 (Server Core installation)"],"product":"Microsoft .NET Framework 3.5 AND 4.8.1","vendor":"Microsoft","versions":[{"lessThan":"2.0.50727.9181 & 3.0.30729.9165 & 4.8.9332.0","status":"affected","version":"4.8.1","versionType":"custom"}]},{"platforms":["Windows 10 Version 1607 for x64-based Systems","Windows Server 2012 (Server Core installation)","Windows Server 2012 R2","Windows Server 2012 R2 (Server Core installation)"],"product":"Microsoft .NET Framework 4.8","vendor":"Microsoft","versions":[{"lessThan":"4.8.4801.0","status":"affected","version":"4.8.0","versionType":"custom"}]}],"cpeApplicability":[{"nodes":[{"cpeMatch":[{"criteria":"cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*","versionEndExcluding":"4.8.4801.0","versionStartIncluding":"4.8.0","vulnerable":true},{"criteria":"cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*","versionEndExcluding":"2.0.50727.9068 & 3.0.30729.9065 & 4.8.4801.0","versionStartIncluding":"4.8.0","vulnerable":true},{"criteria":"cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*","versionEndExcluding":"2.0.50727.9068 & 3.0.30729.9065 & 4.7.4141.0","versionStartIncluding":"4.7.0","vulnerable":true},{"criteria":"cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*","versionEndExcluding":"2.0.50727.9181 & 3.0.30729.9165 & 4.8.9332.0","versionStartIncluding":"4.8.1","vulnerable":true}],"negate":false,"operator":"OR"}]}],"datePublic":"2026-04-14T14:00:00.000Z","descriptions":[{"lang":"en-US","value":"Concurrent execution using shared resource with improper synchronization ('race condition') in .NET Framework allows an unauthorized attacker to deny service over a network."}],"metrics":[{"cvssV3_1":{"baseScore":5.9,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C","version":"3.1"},"format":"CVSS","scenarios":[{"lang":"en-US","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-362","description":"CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')","lang":"en-US","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2026-04-30T14:41:39.848Z","orgId":"f38d906d-7342-40ea-92c1-6c4a2c6478c8","shortName":"microsoft"},"references":[{"name":".NET Framework Denial of Service Vulnerability","tags":["vendor-advisory","patch"],"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32226"}],"title":".NET Framework Denial of Service Vulnerability"}},"cveMetadata":{"assignerOrgId":"f38d906d-7342-40ea-92c1-6c4a2c6478c8","assignerShortName":"microsoft","cveId":"CVE-2026-32226","datePublished":"2026-04-14T16:57:44.474Z","dateReserved":"2026-03-11T01:49:58.662Z","dateUpdated":"2026-04-30T14:41:39.848Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.2"},"nvd":{"publishedDate":"2026-04-14 18:17:31","lastModifiedDate":"2026-05-06 15:00:58","problem_types":["CWE-362","CWE-362 CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')"],"metrics":{"cvssMetricV31":[{"source":"secure@microsoft.com","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H","baseScore":5.9,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":2.2,"impactScore":3.6}]},"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:.net_framework:3.5:-:*:*:*:*:*:*","matchCriteriaId":"23317443-1968-4791-9F20-AD3B308A83D1"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:.net_framework:4.7.2:*:*:*:*:*:*:*","matchCriteriaId":"3EF7A75E-EE27-4AA7-8D84-9D696728A4CE"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:arm64:*","matchCriteriaId":"73D24713-D897-408D-893B-77A61982597D"},{"vulnerable":false,"criteria":"cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:x64:*","matchCriteriaId":"306B7CE6-8239-4AED-9ED4-4C9F5B349F58"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:.net_framework:3.5:-:*:*:*:*:*:*","matchCriteriaId":"23317443-1968-4791-9F20-AD3B308A83D1"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:.net_framework:4.8:*:*:*:*:*:*:*","matchCriteriaId":"2D3F18AF-84ED-473B-A8DF-65EB23C475AF"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:arm64:*","matchCriteriaId":"73D24713-D897-408D-893B-77A61982597D"},{"vulnerable":false,"criteria":"cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:x64:*","matchCriteriaId":"306B7CE6-8239-4AED-9ED4-4C9F5B349F58"},{"vulnerable":false,"criteria":"cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:x86:*","matchCriteriaId":"345FCD64-D37B-425B-B64C-8B1640B7E850"},{"vulnerable":false,"criteria":"cpe:2.3:o:microsoft:windows_server_20h2:-:*:*:*:*:*:x64:*","matchCriteriaId":"23DB22F4-7FFB-4B77-A4BF-EC097938E239"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:.net_framework:4.8:*:*:*:*:*:*:*","matchCriteriaId":"2D3F18AF-84ED-473B-A8DF-65EB23C475AF"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:x64:*","matchCriteriaId":"5E491E46-1917-41FE-8F9A-BB0BDDEB42C3"},{"vulnerable":false,"criteria":"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*","matchCriteriaId":"A7DF96F8-BA6A-4780-9CA3-F719B3F81074"},{"vulnerable":false,"criteria":"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*","matchCriteriaId":"DB18C4CE-5917-401E-ACF7-2747084FD36E"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:.net_framework:3.5:-:*:*:*:*:*:*","matchCriteriaId":"23317443-1968-4791-9F20-AD3B308A83D1"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:.net_framework:4.8.1:*:*:*:*:*:*:*","matchCriteriaId":"934D4E46-12C1-41DC-A28C-A2C430E965E4"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:o:microsoft:windows_11_26h1:-:*:*:*:*:*:arm64:*","matchCriteriaId":"CBFE0371-0C4D-406A-9EC7-456104271C3E"},{"vulnerable":false,"criteria":"cpe:2.3:o:microsoft:windows_11_26h1:-:*:*:*:*:*:x64:*","matchCriteriaId":"F2B83840-FCE8-445A-AE55-ACEDA6534FA1"},{"vulnerable":false,"criteria":"cpe:2.3:o:microsoft:windows_server_2025:-:*:*:*:*:*:x64:*","matchCriteriaId":"FE97605F-7942-435A-9F5B-D51FA19A41AD"}]}]}]},"legacy_mitre":{"record":{"CveYear":"2026","CveId":"32226","Ordinal":"1","Title":".NET Framework Denial of Service Vulnerability","CVE":"CVE-2026-32226","Year":"2026"},"notes":[{"CveYear":"2026","CveId":"32226","Ordinal":"1","NoteData":"Concurrent execution using shared resource with improper synchronization ('race condition') in .NET Framework allows an unauthorized attacker to deny service over a network.","Type":"Description","Title":".NET Framework Denial of Service Vulnerability"}]}}}